Analysis
-
max time kernel
47s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
submitted
11-08-2022 14:20
Behavioral task
behavioral1
Sample
loader175205.exe
Resource
win10v2004-20220722-en
General
-
Target
loader175205.exe
Malware Config
Extracted
marsstealer
Default
54.159.203.55/Zamena.php
Signatures
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Executes dropped EXE 1 IoCs
pid Process 4848 INST.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Control Panel\International\Geo\Nation INST.exe -
Loads dropped DLL 7 IoCs
pid Process 4744 loader175205.exe 4744 loader175205.exe 4744 loader175205.exe 4848 INST.exe 4848 INST.exe 4848 INST.exe 4848 INST.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 INST.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString INST.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3052 timeout.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3136 wrote to memory of 4744 3136 loader175205.exe 81 PID 3136 wrote to memory of 4744 3136 loader175205.exe 81 PID 4744 wrote to memory of 4884 4744 loader175205.exe 82 PID 4744 wrote to memory of 4884 4744 loader175205.exe 82 PID 4744 wrote to memory of 4944 4744 loader175205.exe 83 PID 4744 wrote to memory of 4944 4744 loader175205.exe 83 PID 4944 wrote to memory of 4848 4944 cmd.exe 84 PID 4944 wrote to memory of 4848 4944 cmd.exe 84 PID 4944 wrote to memory of 4848 4944 cmd.exe 84 PID 4848 wrote to memory of 3652 4848 INST.exe 94 PID 4848 wrote to memory of 3652 4848 INST.exe 94 PID 4848 wrote to memory of 3652 4848 INST.exe 94 PID 3652 wrote to memory of 3052 3652 cmd.exe 96 PID 3652 wrote to memory of 3052 3652 cmd.exe 96 PID 3652 wrote to memory of 3052 3652 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\loader175205.exe"C:\Users\Admin\AppData\Local\Temp\loader175205.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\loader175205.exe"C:\Users\Admin\AppData\Local\Temp\loader175205.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SYSTEM32\cmd.execmd /c echo %temp%3⤵PID:4884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\INST.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\INST.exeC:\Users\Admin\AppData\Local\Temp\INST.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\INST.exe" & exit5⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\timeout.exetimeout /t 56⤵
- Delays execution with timeout.exe
PID:3052
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD58f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
Filesize
1.2MB
MD5bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
Filesize
159KB
MD59eb30306051d5319b828be74762268e6
SHA188db00b1524bbb4cb23eb540167a50bfb4b77e03
SHA256b4f03a6e742a4fb4d6d00486d6bc381dc65a9c2573085849b40450da46d47ade
SHA512e980748b653d60b4a475cec9109e537f75543001b66c5fb21a6ccbef5cf534b630e3ad7a17ed2988fd88d5ae5d9c8aeff1b142c48d3efd11671cee098c3d7252
-
Filesize
159KB
MD59eb30306051d5319b828be74762268e6
SHA188db00b1524bbb4cb23eb540167a50bfb4b77e03
SHA256b4f03a6e742a4fb4d6d00486d6bc381dc65a9c2573085849b40450da46d47ade
SHA512e980748b653d60b4a475cec9109e537f75543001b66c5fb21a6ccbef5cf534b630e3ad7a17ed2988fd88d5ae5d9c8aeff1b142c48d3efd11671cee098c3d7252
-
Filesize
93KB
MD54a365ffdbde27954e768358f4a4ce82e
SHA1a1b31102eee1d2a4ed1290da2038b7b9f6a104a3
SHA2566a0850419432735a98e56857d5cfce97e9d58a947a9863ca6afadd1c7bcab27c
SHA51254e4b6287c4d5a165509047262873085f50953af63ca0dcb7649c22aba5b439ab117a7e0d6e7f0a3e51a23e28a255ffd1ca1ddce4b2ea7f87bca1c9b0dbe2722
-
Filesize
93KB
MD54a365ffdbde27954e768358f4a4ce82e
SHA1a1b31102eee1d2a4ed1290da2038b7b9f6a104a3
SHA2566a0850419432735a98e56857d5cfce97e9d58a947a9863ca6afadd1c7bcab27c
SHA51254e4b6287c4d5a165509047262873085f50953af63ca0dcb7649c22aba5b439ab117a7e0d6e7f0a3e51a23e28a255ffd1ca1ddce4b2ea7f87bca1c9b0dbe2722
-
Filesize
93KB
MD54a365ffdbde27954e768358f4a4ce82e
SHA1a1b31102eee1d2a4ed1290da2038b7b9f6a104a3
SHA2566a0850419432735a98e56857d5cfce97e9d58a947a9863ca6afadd1c7bcab27c
SHA51254e4b6287c4d5a165509047262873085f50953af63ca0dcb7649c22aba5b439ab117a7e0d6e7f0a3e51a23e28a255ffd1ca1ddce4b2ea7f87bca1c9b0dbe2722
-
Filesize
93KB
MD54a365ffdbde27954e768358f4a4ce82e
SHA1a1b31102eee1d2a4ed1290da2038b7b9f6a104a3
SHA2566a0850419432735a98e56857d5cfce97e9d58a947a9863ca6afadd1c7bcab27c
SHA51254e4b6287c4d5a165509047262873085f50953af63ca0dcb7649c22aba5b439ab117a7e0d6e7f0a3e51a23e28a255ffd1ca1ddce4b2ea7f87bca1c9b0dbe2722
-
Filesize
1008KB
MD583c8fd1ecade22691bc9df596ccd8660
SHA11321c16e193a541c160ad67168b5777196efdc60
SHA2566d4627111a5dfbd2c339ead617a9a78d93146bd868a7aeecf8e56fb59734331b
SHA51293c6c0f9b225502219d049ec86e44289ca04f9db12651577f6be528c5a12fa62ac32bfb8674b2f562dbca7cced2f3757a08290579f8daed6d926bf11a522f297
-
Filesize
4.0MB
MD526ba25d468a778d37f1a24f4514d9814
SHA1b64fe169690557656ede3ae50d3c5a197fea6013
SHA2562f3e368f5bcc1dda5e951682008a509751e6395f7328fd0f02c4e1a11f67c128
SHA51280471bfeeab279ce4adfb9ee1962597fb8e1886b861e31bdff1e3aa0df06d93afeb3a3398e9519bab7152d4bd7d88fa9b328a2d7eb50a91eb60fead268912080
-
Filesize
4.0MB
MD526ba25d468a778d37f1a24f4514d9814
SHA1b64fe169690557656ede3ae50d3c5a197fea6013
SHA2562f3e368f5bcc1dda5e951682008a509751e6395f7328fd0f02c4e1a11f67c128
SHA51280471bfeeab279ce4adfb9ee1962597fb8e1886b861e31bdff1e3aa0df06d93afeb3a3398e9519bab7152d4bd7d88fa9b328a2d7eb50a91eb60fead268912080
-
Filesize
971KB
MD5bd8b198c3210b885fe516500306a4fcf
SHA128762cb66003587be1a59c2668d2300fce300c2d
SHA256ce2621719f1358508c2c33bcc1380d78a737ca20cd18c0ac89f38e1be788d9a2
SHA512c32b6c083d3a7da01085718e5685e9a04034be91251c065794ceef1dfaaf6573fdd845cbc84e926ab3f510d295649cb6e497564fbe52cc79c053357c645c11a5
-
Filesize
971KB
MD5bd8b198c3210b885fe516500306a4fcf
SHA128762cb66003587be1a59c2668d2300fce300c2d
SHA256ce2621719f1358508c2c33bcc1380d78a737ca20cd18c0ac89f38e1be788d9a2
SHA512c32b6c083d3a7da01085718e5685e9a04034be91251c065794ceef1dfaaf6573fdd845cbc84e926ab3f510d295649cb6e497564fbe52cc79c053357c645c11a5